Chapter

A Study on the IoT Based Smart Door Lock System

Authors:
To read the full-text of this research, you can request a copy directly from the author.

Abstract

The proposed method in this study uses the IoT technology and the application of smartphone communication technology to conventional device (door lock) to open or close a door remotely through authentication. In particular, this study proposes the Smart Door Lock System based security enhancement plan for the safety issue caused by the physical key used in unmanned automation machines, such as ATMs, KIOSKs, and vending machines.

No full-text available

Request Full-text Paper PDF

To read the full-text of this research,
you can request a copy directly from the author.

... Various digital-electronic door locking systems have been reported in the literature. They include: "electronic locking system operated by the combination of digital key, security password or number codes" (Hwang & Baek, 2007), Radio Frequency Identification (RFID) based locks (Verma & Tripathi, 2010, Park et al., 2009, "design of both a Near Field Communication (NFC) and a smartphone to achieve a door lock control system" (Hung et al., 2015), smart door lock system based on blockchain (Han et al., 2017) and Internet of Thing (IoT) enabled door lock system (Adiono et al., 2019, Jeong, 2016. ...
Conference Paper
Full-text available
A major challenge in a lock and key security system is the possibility of loss or misplacement of the key which may leave the occupant with no other option than to break the lock. In some cases, it may require pulling down the whole door, before removal and replacement can be achieved. Other identified limitations of the conventional lock and key security system include inaccessibility to the key locked remotely, and unnoticed break and access by intruder until after the damage is done etc. Therefore the need to cater for all the aforementioned drawbacks of the conventional lock and key arises. In this paper, a password-controlled security door system with Short Message Service (SMS) for a notification was developed to enhance users security and eliminate the cost of replacement of key when misplaced. The system consisted of a Passive Infra-Red (PIR) motion sensor module that detects movements of any object around its front surface coupled with the GPRS module, PIC16F877A Microcontroller and other electronic accessories. The developed system was able to give a correct visual report of "access denied" to any unauthorized user and as well as send a timely SMS alert to the occupant via a mobile number for notification of intruder or unusual password access denial.
... Various digital-electronic door locking systems have been reported in the literature. They include: "electronic locking system operated by the combination of a digital key, security password or number codes" (Hwang & Baek, 2007), Radio Frequency Identification (RFID) based locks (Verma & Tripathi, 2010, Park et al., 2009, "design of both a Near Field Communication (NFC) and a smartphone to achieve a door lock control system" (Hung et al., 2015), smart door lock system based on blockchain (Han et al., 2017) and Internet of Thing (IoT) enabled door lock system (Adiono et al., 2019, Jeong, 2016. Other door lock units have been based on one biometric feature or the other. ...
Article
Full-text available
The numerous drawbacks of the lock and key security system, have necessitated the development of automated door lock systems. In this paper, a hybridized security door with password-based access and SMS notification enhancement was designed to ensure house owners security and eliminate the cost of replacement of key when misplaced. The system comprises of a Passive Infra-Red (PIR) motion sensor module that detects movements of any object around its front surface coupled with the GPRS module, PIC16F877A Microcontroller unit (MCU) and other electronic accessories. Once motion is detected by the PIR, the system activates the MCU to initiate the lock and unlock process via the inputting of a password. The MCU also activates the GSM module to send an SMS to the house occupant when the system notices an unauthorised user. The system categorises a person as an unauthorised user when a wrong password is entered three times. The developed system was able to give a correct visual report of "access denied" to any unauthorized user and as well as send a timely SMS alert to the occupant via a registered mobile number for unusual password access denial notification.
... Many DSDL systems was developed recently and commonly used in commercials homes and buildings [13][14][15][16][17][18][19][20]. Based on RFID (radio frequency identification) technology, low cost technology. ...
Article
Full-text available
Home and building security are major concern in our daily life and digital smart door lock (DSDL) have become an essential part of these systems. In this paper, a secure DSDL which can grant access to home with a fingerprint is designed and implemented. An Arduino Nano microcontroller board, finger print sensor and servo motor have been utilized for lock/unlock door based on finger print. The DSDL is an automatic authenticate and validate the user for secure access. The implemented system aims to develop a cost−effective DSDL based on low−cost components compared to the systems already on the domestic market. The−ease of−use and cost−effectiveness makes the DSDL a strong competitor to the digital security system on the domestic market and outperforms it and suitable for security-based home automation systems.
... Another pioneering IoT application in hospitality is the smart door lock system deployed by Starwood Hotels (Bantau and Rayburn, 2016) providing keyless entry to members of the chain's loyalty program with a simple gesture of guest smartphones (Jeong, 2016). Further, security, engineering, front desk and information technology (IT) departments in hotels have been able to leverage on connectivity of locks. ...
Article
Full-text available
Purpose The purpose of this study is to explore the use of Internet of Things (IoT) in hospitality and examine its relationship with Big Data. Drawing upon theoretical and practical considerations, it lays a foundation for its adoption in practice and future research. Design/methodology/approach This paper uses a conceptual approach. It demonstrates the use of IoT and its impact on Big Data in hospitality through exemplars. The paper further explores the convergence of IoT, Big Data and hospitality in the context of the literature, value attributes and vendor offerings. Theoretical models from information systems and business are used to support the concepts proposed. Findings The study compiles and contextualizes the applications of IoT in hospitality by applying an input–process–output model, demonstrating the link to Big Data. The resulting value dimensions are represented by the IoT–Big Data triple impact intensity model. Research limitations/implications An outlook toward the future trajectory of IoT adoption is provided by proposing to extend the prevalent social, mobile, analytics and cloud framework with an IoT component. Practical implications Practical implications of the use of IoT and Big Data in hospitality on information technology infrastructure, business models, security and standardization highlight the scope for further empirical research. Originality/value By synthesizing IoT applications in hospitality and by bringing to light their relationship with Big Data, the study demonstrates how IoT, Big Data and hospitality converge – a synthesis that has thus far been largely unexplored. This study lays the groundwork for increased deployment of IoT and Big Data in hospitality and future academic research in this area.
Chapter
Home security has increased in recent years with the help of technology. Even more, the appearance of the internet of things (IoT) allows it to control and monitor devices from anywhere in the world. This work develops a proposal that alerts the user about the status of a door through a mobile application using low-cost devices. For the electronic design, a magnetic contact sensor has been used that detects if the door is open. An electric lock is also used to control the door with the mobile application from anywhere in the user. The electronic system is based on an ESP32 board that has WiFi communication, this board sends the door status data to the mobile application. The electric lock can be activated in three ways: manually from the door, automatically according to a programmed routine, and remotely using the mobile app. The platform used for the IoT is Firebase, which allows the exchange of information between the local site and the remote site. The tests carried out around the prototype have responded correctly, the installed sensor continuously reports on the status of the door, and the control is executed according to the orders sent through the cloud. In addition, an acceptance test is used that guarantees the correct operation of the proposal.
Chapter
Today it can still be seen that the lack of technology in old and low-cost vehicles does not allow basic security remote monitoring. For this reason, it is necessary to update its technology, installing electronic systems based on free hardware to perform readings in the vehicles. In addition, mobile devices allow viewing this information remotely using the Internet. In this work, the monitoring of security in a vehicle is carried out using a mobile application. For this, the door state and the vehicle’s internal temperature are read. This electronic system is based on the ESP32 board that has a WiFi communication module to connect to the internet. This is programmed using the Arduino IDE environment. On the other hand, the mobile application installed on a mobile phone is constantly updated and alerts in case of changes. This application is developed in App inventor. A cloud database in Firebase is used to interconnect these two stations, which serves as a container to exchange information. As result, a product acceptance test was applied, obtaining a qualification that validate this proposal.
Chapter
The advent of massive technological paradigm shift to subsequent interest in augmented reality (AR) paved the way for designers to design, develop and deploy new use cases of AR in the service industry. In this paper, we investigate the use of augmented reality as an option for providing entry into secured buildings by comparing it against the traditional radio frequency identification devices cards. 51 participants from various backgrounds were recruited to enter a secured building using an AR-based app and an RFID card. The results stipulate that AR-based app had a greater acceptance among participants in terms of security and ease of use. 40 participants thought AR-based app is more secure than RFID cards and 34 participants felt the application was easier to use compared to RFID cards. 32 participants indicated that they would prefer to use the AR-based on daily basis. The result only came short in favor of RFID-based systems in terms of faster access with a margin of 3 persons where RFID systems outperformed AR-Based systems. The results indicate that the system is a suitable option but further research is needed to deploy the research in real-world settings.
Conference Paper
Full-text available
Thanks to their broad international acceptance and availability in high denominations, there is widespread concern that Euro banknotes may provide an attractive new currency for criminal transactions. With this in mind, the European Central Bank has proposed to embed small, radio-frequency-emitting identification (RFID) tags in Euro banknotes by 2005 as a tracking mechanism for law enforcement agencies. The ECB has not disclosed technical details regarding its plan. In this paper, we explore some of the risks to individual privacy that RFID tags embedded in currency may pose if improperly deployed. Acknowledging the severe resource constraints of these tags, we propose a simple and practical system that provides a high degree of privacy assurance. Our scheme involves only elementary cryptography. Its effectiveness depends on a careful separation of the privileges offered by optical vs. radio-frequency contact with banknotes, and full exploitation of the limited access-control capabilities of RFID tags. KeywordsBanknotes-cryptography-RFID-privacy
Article
In this thesis, an automatic door lock system using a dual tone multiple frequency(DTMF) signal generated as pushing the key button of mobile phone is proposed and implemented. This system consists of a transmitter module and a receiver module for processing the DTMF signal of mobile phone. The DTMF signal of mobile phone connected with ear-phone jack enter into the input terminal of DTMF receiver and those are encoded by a code-converter with 4-bits binary format in the DTMF receiver. The encoded output signals are transmitted to the amplitude shift keying(ASK) modulator of transmitter module and the modulated ASK signals which are converted into radio frequency(RF) signals propagate in a free space. The RF signals passed through a free space are demodulated by the ASK demodulator of receiver module and the demodulated ASK signals are sent to a micro-controller unit(MCU). The output signals processed by the MCU are compared with the secreted identification number which is prerecorded in a microprocessor and are transferred to a power relay. If the result is the same, the automatic door lock system opens a door. In the opposite case, it maintains closing the door. The implemented automatic door lock system operates well in mobile environments.
Article
The technical analysis used in determining which of the potential Advanced Encryption Standard candidates was selected as the Advanced Encryption Algorithm includes efficiency testing of both hardware and software implementations of candidate algorithms. Reprogrammable devices such as field-programmable gate arrays (FPGAs) are highly attractive options for hardware implementations of encryption algorithms, as they provide cryptographic algorithm agility, physical security, and potentially much higher performance than software solutions. This contribution investigates the significance of FPGA implementations of the Advanced Encryption Standard candidate algorithms. Multiple architectural implementation options are explored for each algorithm. A strong focus is placed on high-throughput implementations, which are required to support security for current and future high bandwidth applications. Finally, the implementations of each algorithm will be compared in an effort to determine the most suitable candidate for hardware implementation within commercially available FPGAs.
Design of an improved digital DTMF receiver
  • Y S Kim
  • Y Hur
  • K H Ryoo
Design of Data Encryption Module using AES/SEED and Implementation of Multimedia Security System
  • H S Kim
  • D R Park
  • J W Cha
  • Y C Kim
Advanced Encryption Standard (AES). FIPS PUB 197
  • Nist
The Internet of Things
  • L Atzori
  • A Irea
  • G Morabito